Phishing Analysis Tools (TryHackMe)
Phishing analysis goes beyond reading email headers manually. In this room, Phishing Emails 2 on TryHackMe, the focus shifts to tooling: automating the extraction of artifacts from suspicious emails a

Search for a command to run...
Articles tagged with #phishing
Phishing analysis goes beyond reading email headers manually. In this room, Phishing Emails 2 on TryHackMe, the focus shifts to tooling: automating the extraction of artifacts from suspicious emails a

Phishing is one of the oldest and most successful cyberattacks, and even in Wareville, it remains a major threat — especially now that TBFC’s Email Protection Platform has gone offline. With no automated filters to block suspicious content, every unu...

Just another day in the SOC often begins with an unexpected alert — this time, a suspicious email reported by a Sales Executive at Greenholt PLC. The email contained unusual language, an unexpected reference to a money transfer, and an unsolicited at...

Phishing remains one of the most common attack vectors used by threat actors to harvest user credentials. In this task, we investigated a phishing website hosted on Amazon S3, allegedly set up by “DarkInjector” to trick users into providing their log...

In this article, we’ll cover Phishing - He had a brain full of macros and had shells in his soul writeup as the Day 2 challenge of the Advent of Cyber event challenge. It was interesting to navigate the platform and filter different events and logs b...
